Hi [[ session.user.profile.firstName ]]

Now That Ransomware Has Gone Nuclear, How Can You Avoid Becoming the Next Victim

There is a reason more than half of today’s ransomware victims end up paying the ransom. Cyber-criminals have become thoughtful; taking time to maximize your organization’s potential damage and their payoff. After achieving root access, the bad guys explore your network reading email, finding data troves and once they know you, they craft a plan to cause the most panic, pain, and operational disruption. Ransomware has gone nuclear.

Join Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, and TruthInIT's David Littman as they dive into:

Why data backups (even offline backups) won’t save you
Evolved threats from data-theft, credential leaks, and corporate impersonation
Why ransomware isn’t your real problem
How your end users can become your best, last line of
defense
Recorded Mar 26 2020 58 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Roger Grimes, David Littman
Presentation preview: Now That Ransomware Has Gone Nuclear, How Can You Avoid Becoming the Next Victim

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Lower Your Business Risk with Best Practice Data Privacy Impact Assessments Recorded: Jun 1 2020 45 mins
    Lecio DePaula Jr.
    Whether you're creating a new product, going through a merger & acquisitions, or significantly changing a process in your organization, new processing activities can present high risk to your organization. As we can see from Marriott’s acquisition of Starwood, not undergoing a full security and privacy assessment can present huge problems for your organization and now Marriott faces a $123.6 million dollar fine due to lack of due diligence.

    One way to reduce risks and identify security/privacy risk is to conduct a data protection impact assessment. Not only will this assessment help you reduce business risk, but it also helps identify new processes in your organization to maintain compliance with GDPR, LGPD, CCPA and other global privacy laws.

    Join Lecio DePaula Jr., KnowBe4’s Data Privacy Director, for this webinar to hear about creating a robust data protection impact assessment to analyze new processes, workflows, and products to identify problems before they happen.

    In this webinar you’ll learn:

    - Best practices for conducting a robust DPIA
    - The privacy and security risks of M&A, creating new software products, other initiatives
    - How conducting a DPIA aligns with global privacy requirements
    - Common DPIA mistakes and how to avoid them
    - Tools that help manage and streamline your DPIA process
  • Your Ransomware Task Force: Extortion, Crisis Management and Recovery Recorded: May 26 2020 59 mins
    Roger Grimes (KnowBe4), Bill Hardin (Charles River Associates)
    When you realize your organization has been hit with a ransomware attack there are a few things that need to happen. One… take a deep breath. Two… contain the damage. And three… initiate your recovery plan IMMEDIATELY.

    Watch this on-demand webinar where Roger Grimes, KnowBe4's Data-Driven Defense Evangelist, interviews Bill Hardin of Charles Rivers Associates for an exclusive webinar, Ransomware Expert Guide: Extortion, Crisis Management, and Recovery. Roger and Bill take a deep dive into ransomware forensics and recovery to help you prepare for a rapid response before a ransomware attack affects your organization.

    In this session you’ll learn:

    - Of the thousands of cyber events Bill has investigated what is different in 2020
    - Tactics and techniques your security team can use to hunt within your environment
    - Bill’s top 3 takeaways regarding ransomware recovery
    - How to enable your users to spot suspicious attacks before they affect you
  • 2020 Phishing by Industry Benchmarking Report: How Do You Measure Up? Recorded: May 21 2020 15 mins
    Javvad Malik, KnowBe4's Security Awareness Advocate for Europe
    As a security leader, you have a lot on your plate. Even as you increase your budget for sophisticated security software, your exposure to cybercrime keeps going up. IT security seems to be a race between effective technology and ever evolving attack strategies from the bad guys. However, there’s an often-overlooked security layer that can significantly reduce your organisation’s attack surface: New-school security awareness training.

    Watch Javvad Malik, KnowBe4’s Security Awareness Advocate for Europe, in this video webinar for a review of KnowBe4’s latest Phishing By Industry Benchmarking Report, a data set of nearly four million users across 17,000 organisations.

    You will learn more about:

    · New phishing benchmark data for 19 industries

    · Understanding who’s at risk and what you can do about it

    · Actionable tips to create your “human firewall”

    · The value of new-school security awareness training

    Do you know how your organisation compares to your peers? Watch this webinar to find out!
  • Your Ransomware Task Force: Critical Steps for Responding to a Ransomware Attack Recorded: May 20 2020 61 mins
    Roger Grimes (KnowBe4), John Mullen (Mullen Coughlin)
    When you realize your organization has been hit with a ransomware attack there are a few things that need to happen. One… take a deep breath. Two… contain the damage. And three… initiate your recovery plan IMMEDIATELY.

    To help you prepare for a rapid response Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, interviewed John Mullen, of Mullen Coughlin LLC, who is a seasoned, hands-on ransomware and data loss professional. John has served as a “Breach Coach” to thousands of affected organizations to help them contain and investigate ransomware attacks.

    In this session you’ll learn:

    - The number one mistake most ransomware victims are making today
    - When you need to call a “Breach Coach” and what they can do to help
    - Rapid response steps you need to take when your organization gets hit
    - Why new-school security awareness training is more critical than ever before
  • Addressing the Challenge of Third-Party Vendor Risk: Securing Your Supply Chain Recorded: May 19 2020 59 mins
    James McQuiggan
    Your customer data, intellectual property, and financials are the lifeblood of your organization. If lost or leaked, there could be significant implications to the viability of your business. Maintaining control of that data, especially with third-party services, can be extremely challenging and requires that you ask the right questions and enforce stringent security policies.

    In an environment of increased outsourcing, cloud computing adoption, and regulatory requirements, how do you manage vendor risk and ensure you have a consistent evaluation life cycle

    Join James McQuiggan, KnowBe4's Security Awareness Advocate, to get actionable steps you can use now to better manage your third-party vendor risk. You'll learn:

    The importance of securing your organization's critical data
    How to determine Supplier Security Proficiency
    Why it’s important to understand the source of third-party products
    The impact Vendor Questionnaires have on your Security Posture
    How leveraging a GRC platform can ease the burden of risk assessments and audits
  • The Pandemic of Ransomware: How Cyber Criminals React to the Chaos Recorded: May 15 2020 64 mins
    Erich Kron (KnowBe4), Bruce Sussman (SecureWorld)
    Phishing is the number one way that the bad guys infect computers with malware like ransomware. With the world at a practical standstill and in utter chaos, one thing that has not slowed down is the amount of phishing attacks, and thus the number of ransomware attacks. In fact, attempts by cybercriminals to infiltrate networks has increased during these uncertain times. It's estimated that Google has blocked nearly 18 million COVID-19 related phishing attacks. People are less secure now, and the bad guys know it.

    Join Erich Kron, Security Awareness Advocate at KnowBe4, and Bruce Sussman of SecureWorld as they discuss the latest advances in ransomware, phishing trends, and why it's more important than ever to have a strong security culture within your organization.
  • Now That Ransomware Has Gone Nuclear, How Can You Avoid Becoming the Next Victim Recorded: May 8 2020 64 mins
    Roger Grimes (KnowBe4), Gary Miliefsky (Cyber Defense Media Group)
    There is a reason more than half of today’s ransomware victims end up paying the ransom. Cyber-criminals have become thoughtful; taking time to maximize your organization’s potential damage and their payoff. After achieving root access, the bad guys explore your network reading email, finding data troves and once they know you, they craft a plan to cause the most panic, pain, and operational disruption. Ransomware has gone nuclear.

    Join us for this webinar where, Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, and Gary Miliefsky, publisher of Cyber Defense Media Group, dive into:

    - Why data backups (even offline backups) won’t save you
    - Evolved threats from data-theft, credential leaks, and corporate impersonation
    - Why ransomware isn’t your real problem
    - How your end users can become your best, last line of defense
  • Cyber CSI: Learn How to Forensically Examine Phishing Emails Recorded: May 1 2020 61 mins
    Roger Grimes, David Littman
    Cyber crime has become an arms race where the bad guys constantly evolve their attacks while you, the vigilant defender, must diligently expand your know how to prevent intrusions into your network. Staying a step ahead may even involve becoming your own cyber crime investigator, forensically examining actual phishing emails to determine the who, the where, and the how.

    In this webinar, Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, and David Littman from TruthInIT, will show you how to become a digital private investigator! You’ll learn:

    How to forensically examine phishing emails and identify other types of social engineering
    What forensic tools and techniques you can use right now
    How to investigate rogue smishing, vishing, and social media phishes
    How to enable your users to spot suspicious emails sent to your organization
    Get inside the mind of the hacker, learn their techniques, and how to spot phishing attempts before it’s too late!
  • The Importance of Matching Security Awareness Content to Your Target Audience Recorded: Apr 23 2020 29 mins
    Perry Carpenter, Joanna Huisman
    Security awareness is critical to protecting your organization’s most valuable information, but there is a huge difference between a one-size fits all approach versus new-school security security awareness training. Your users are humans, after all, not computers, and they all learn in different ways and have a variety of needs. Find out why providing a wide variety of content to your users helps ensure that they not only retain but use this vital information.

    Join Perry Carpenter, KnowBe4’s Chief Strategy Officer, and Joanna Huisman, SVP of Strategic Insights and Research, as they dive into why having a content strategy is so important to your security awareness training program. They discuss topics like:

    - How to ensure content is consumed, retained and acted upon
    - Why capturing and maintaining the attention of your users is so critical
    - The importance of speaking to different learning styles
    - The difference storytelling can make in message retention
  • The Art of Invisibility featuring Kevin Mitnick and Perry Carptenter Recorded: Apr 20 2020 65 mins
    Kevin Mitnick, Perry Carpenter
    Corporate privacy concerns are more paramount right now than ever before. Organizations are being forced to maneuver a new world of security and privacy issues related to a remote workforce, evolving hardware/software needs, and employee access policies. Kevin Mitnick knows this world well. In fact, that's the topic of his book, The Art of Invisibility.

    Join us for this exclusive webinar as Kevin Mitnick, KnowBe4's Chief Hacking Officer, and Perry Carpenter, KnowBe4's Chief Evangelist and Strategy Officer, enter into an eye-opening discussion of the expected and unexpected risks this workforce evolution brings.

    They will discuss topics including:

    - Privacy concerns around employees using personal devices for business purposes
    - Security issues with various operating systems, mobile devices, and the Internet of Things
    - The reality of "deep privacy" and how tied together devices, systems, and surveillance really are
    - Shocking new demonstrations that will change the way you think about privacy
    - Why new-school security awareness training is more critical than ever before
  • Africa - You've Been Phished: The State of the Human Factor in Cybersecurity Recorded: Apr 13 2020 68 mins
    Anna Collard, Managing Director od KnowBe4 Africa & Joanna Huisman, SVP of Strategic Insights and Research
    Cybercriminals are quickly shifting their attention to the African continent and other emerging economies. The sharp increase in digitization and mobile financial transactions, as well as a relatively unregulated environment, makes Africa highly attractive for criminals. How can you prepare your organization to deal with this increased risk to the region?

    Join Anna Collard, Managing Director of KnowBe4 Africa, and Joanna Huisman, SVP of Strategic Insights and Research, as they discuss the findings from the KnowBe4 Africa Cybersecurity Awareness Report and share actionable security tips you can use now.

    You will learn about:

    The most at-risk countries in Africa and the unique challenges they face
    The cybercrime status on the African continent
    Why phishing, malware and credential theft is a huge risk
    Tips that can be used now to help keep your organization safe
    The importance of training your users to create your human firewall
    Don’t let your organization become the next victim! Learn how you can better protect your network today.
  • Now That Ransomware Has Gone Nuclear, How Can You Avoid Becoming the Next Victim Recorded: Apr 10 2020 103 mins
    Roger Grimes (KnowBe4), Sam Masiello (Gates Corporation), Tom Bechtold (SecureWorld)
    Join Roger Grimes, SecureWorld's Tom Bechtold, and Gates Corporation CISO Sam Masiello as they discuss the ever changing (and scary) world of ransomware.

    There is a reason more than half of today’s ransomware victims end up paying the ransom. Cyber-criminals have become thoughtful; taking time to maximize your organization’s potential damage and their payoff. After achieving root access, the bad guys explore your network reading email, finding data troves and once they know you, they craft a plan to cause the most panic, pain, and operational disruption. Ransomware has gone nuclear.

    They dive into:

    Why data backups (even offline backups) won’t save you
    Evolved threats from data-theft, credential leaks, and corporate impersonation
    Why ransomware isn’t your real problem
    How your end users can become your best, last line of
    defense
  • The Many Ways to Hack Multi-Factor Authentication Recorded: Apr 8 2020 62 mins
    Roger Grimes, David Littman
    Everyone knows that multi-factor authentication (MFA) is more secure than a simple login name and password, but too many people think that MFA is a perfect, unhackable solution. It isn't!

    Join Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist, a security expert with over 30-years experience, and David Littman of TruthInIT for this video webinar where they will explore 12 ways hackers can and do get around your favorite MFA solution.

    The on-demand webinar includes a (pre-filmed) hacking demo by KnowBe4's Chief Hacking Officer Kevin Mitnick, and real-life successful examples of every attack type. It will end by telling you how to better defend your MFA solution so that you get maximum benefit and security.

    You'll learn about the good and bad of MFA, and become a better computer security defender in the process, including:

    - 12 ways hackers get around multi-factor authentication
    - How to defend your multi-factor authentication solution
    - The role humans play in a blended-defense strategy
  • Is Your Traditional Security Stack Giving You A False Sense of Security? Recorded: Apr 7 2020 61 mins
    Kevin Mitnick, Perry Carpenter
    Endpoint security, firewalls, VPNs, authentication systems… we’ve all got them. But do they really provide the comprehensive level of security your organization needs to keep the bad guys out? The unfortunate reality is that each of these security layers can provide hackers with a back-door right into your organization. And we're going to show you how.

    In this exclusive webinar Kevin Mitnick, the World's Most Famous Hacker and KnowBe4's Chief Hacking Officer, and Perry Carpenter, KnowBe4's Chief Evangelist and Strategy Officer, show you shocking examples of significant vulnerabilities that social engineers and hackers use to circumvent these traditional security layers.

    There is no need for a false sense of security. Better defend your network by learning:

    - The 3 most common causes of data breaches
    - Significant vulnerabilities recently discovered in common technologies
    - Kevin’s top tips for security defenders
    - Why security awareness training is a security layer you can’t afford to skip

    Kevin shares new hacking demos that will scare the daylights out of you. Find out how to mitigate these risks before it’s too late!
  • New 2020 Phishing By Industry Benchmarking Report Recorded: Mar 27 2020 64 mins
    Perry Carpenter, Joanna Huisman
    As a security leader, you have a lot on your plate. Even as you increase your budget for sophisticated security software, your exposure to cybercrime keeps going up. IT security seems to be a race between effective technology and ever evolving attack strategies from the bad guys. However, there’s an often-overlooked security layer that can significantly reduce your organization’s attack surface: New-school security awareness training.

    Join Perry Carpenter, KnowBe4's Chief Evangelist and Strategy Officer, and Joanna Huisman, KnowBe4's Senior Vice President of Strategic Insights and Research, for a review of our 2020 Phishing By Industry Benchmarking Report, a data set of nearly four million users across 17,000 organizations.

    You will learn more about:

    - New phishing benchmark data for 19 industries
    - Understanding who’s at risk and what you can do about it
    - Actionable tips to create your “human firewall”
    - The value of new-school security awareness training

    Do you know how your organization compares to your peers? Watch this webinar to find out!
  • Empowering Your Human Firewall: The Art and Science of Secure Behavior Recorded: Mar 26 2020 61 mins
    Perry Carpenter, David Littman
    You know that "security awareness" is key to a comprehensive security strategy. But just because someone is aware doesn't mean they care. So how can you design programs that work with, rather than against, human nature? Here's the great news. Creating a security awareness strategy that not only educates, but reinforces good behaviors can be achieved and we'll show you how.

    In this webinar, Perry Carpenter, Chief Evangelist and Strategy Officer for KnowBe4, and David Littman of TruthInIT unpack a number of key elements from his new book Transformational Security Awareness. What Neuroscientists, Storytellers, and Marketers can Teach Us About Driving Secure Behaviors. Drawn from his experience as an awareness practitioner, CISO mentor, researcher, and author, Perry will dive into ideas like how to use "Trojan Horses for the Mind," how to leverage social dynamics to drive behavior and shape culture, and will unveil some exciting new behavior models that will help you stop the bad guys in their tracks.

    This presentation will take a deep (and practical) dive into:

    · How to understand and design for behavioral segments
    · How to successfully debug bad behaviors
    · How to influence motivation in three different ways
    · And why it is important to live your awareness program through the eyes of your audience
  • Now That Ransomware Has Gone Nuclear, How Can You Avoid Becoming the Next Victim Recorded: Mar 26 2020 58 mins
    Roger Grimes, David Littman
    There is a reason more than half of today’s ransomware victims end up paying the ransom. Cyber-criminals have become thoughtful; taking time to maximize your organization’s potential damage and their payoff. After achieving root access, the bad guys explore your network reading email, finding data troves and once they know you, they craft a plan to cause the most panic, pain, and operational disruption. Ransomware has gone nuclear.

    Join Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, and TruthInIT's David Littman as they dive into:

    Why data backups (even offline backups) won’t save you
    Evolved threats from data-theft, credential leaks, and corporate impersonation
    Why ransomware isn’t your real problem
    How your end users can become your best, last line of
    defense
  • Critical Considerations To Improve Remote Employee Security During COVID-19 Recorded: Mar 25 2020 60 mins
    Roger Grimes and Perry Carpenter
    Quickly evolving travel and social requirements in response to COVID-19 mean that, like it or not, many organizations like yours are asking traditional office-based employees to work from home. Today's technology allows that to happen in many cases with relative ease; however, are your employees prepared with the necessary knowledge to keep themselves and your network safe under these circumstances?

    Listen to Perry Carpenter, KnowBe4's Chief Evangelist and Strategy Officer, and, Roger Grimes, KnowBe4's Data-Driven Defense Evangelist, to find out the most important items you need to know now to prepare your employees for today's new risks.

    In this on-demand webinar you'll learn:

    - Top considerations for safely connecting to your corporate network
    - Scams the bad guys are using right now to target your employees
    - Advice for improving social media security awareness
  • Never Assume Breach: Build a Data-Driven Defense Strategy with Roger Grimes Recorded: Mar 12 2020 61 mins
    Roger Grimes
    Even the world’s most successful organizations have significant weaknesses in their IT security defenses, which today’s determined hackers can exploit at will. There’s even a term for it: Assume Breach.

    But assuming you’ll be hacked isn’t an option for you. Your organization can’t afford a loss of assets or downtime.

    Join Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, for this informative webinar where you’ll learn not only the most common reasons for data breaches in organizations like yours but how you can determine your specific weaknesses.

    You’ll walk away from this understanding:

    - What most organizations are doing wrong and how to fix it
    - How to build an action plan to improve your IT security effectiveness
    - Why security awareness training is a security layer you can’t afford to skip
  • Cyber CSI: Learn How to Forensically Examine Phishing Emails Recorded: Mar 5 2020 59 mins
    Roger Grimes, Data-Driven Defense Evangelist, KnowBe4
    Cyber crime has become an arms race where the bad guys constantly evolve their attacks while you, the vigilant defender, must diligently expand your know how to prevent intrusions into your network. Staying a step ahead may even involve becoming your own cyber crime investigator, forensically examining actual phishing emails to determine the who, the where, and the how.

    In this webinar, Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, will show you how to become a digital private investigator!
    You’ll learn:

    - How to forensically examine phishing emails and identify other types of social engineering
    - What forensic tools and techniques you can use right now
    - How to investigate rogue smishing, vishing, and social media phishes
    - How to enable your users to spot suspicious emails sent to your organization 
    - Get inside the mind of the hacker, learn their techniques, and how to spot phishing attempts before it’s too late!
Security Awareness Training
KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. Realizing that the human element of security was being seriously neglected, KnowBe4 was created to help organizations manage the problem of social engineering, spear phishing, and ransomware attacks, through a comprehensive new-school awareness training approach. KnowBe4 trains employees to make smarter security decisions.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Now That Ransomware Has Gone Nuclear, How Can You Avoid Becoming the Next Victim
  • Live at: Mar 26 2020 3:35 pm
  • Presented by: Roger Grimes, David Littman
  • From:
Your email has been sent.
or close